About your Search

20130416
20130424
Search Results 0 to 1 of about 2
plan. a problem we can come back quickly. , if theuestion is obama administration and many senate democrats have maintained that the implementation of standards for critical infrastructure sectors would compel better behavior, have you seen that in the electric industry with the establishment of these standards for singh -- forcing companies to take it more seriously? >> sure. if there are standards, people in the companies responsible, there are federal regulators you have to go to to be accountable for the standards. so there is that attention that is there. still haveted, you to go way beyond the standards in order to -- >> beyond the standards, one of the biggest threats to the security infrastructure is the human element, the insider threat. the errors of commission or omission. employee training is one of the most important things. you can have the best standards, the best technology, the best procedures, but if your people are not trained, your customers are not trained -- the financial industry sees its customers as part of the broader ecosystem. not only are we trying to
the united states. in his state of the union address president obama said that our enemies are seeking the ability to sabotage her power grid are financial institutions are air traffic control systems could we have representatives this week from all three of those industries. gentleman i want to start with an opening question for each of you. what are some of the attacks that have happened on your industry and how are you preventing them? we will begin with tom kuhn of the edison electric institute which represents several electric companies in united states. >> guest: thank you peter. so far, we have seen every day attacks from various sources but so far the major attacks we have had have been on customer information systems or things of that nature. they haven't been the attacks they keep me up at night which are the ones that would do some some damage to her critical in the structure. >> host: how do you work to prevent them? >> guest: how do we work to prevent those? we have technologies, cybertechnologies, prevention technologies. we spend a lot of time looking at detection techno
Search Results 0 to 1 of about 2